Analysis
-
max time kernel
59s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2023, 04:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gxh3902-infura--ipfs-io.translate.goog/ipfs/Qmc5bXG4kBZMEaCe83H7Yf5w6Rrhfn1hkRfbaj8HGcTcSq?redacted_email&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp
Resource
win10v2004-20230220-en
General
-
Target
https://gxh3902-infura--ipfs-io.translate.goog/ipfs/Qmc5bXG4kBZMEaCe83H7Yf5w6Rrhfn1hkRfbaj8HGcTcSq?redacted_email&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133244582192021916" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2588 chrome.exe 2588 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe Token: SeShutdownPrivilege 2588 chrome.exe Token: SeCreatePagefilePrivilege 2588 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe 2588 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2852 2588 chrome.exe 83 PID 2588 wrote to memory of 2852 2588 chrome.exe 83 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 4440 2588 chrome.exe 84 PID 2588 wrote to memory of 1732 2588 chrome.exe 85 PID 2588 wrote to memory of 1732 2588 chrome.exe 85 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86 PID 2588 wrote to memory of 2244 2588 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://gxh3902-infura--ipfs-io.translate.goog/ipfs/Qmc5bXG4kBZMEaCe83H7Yf5w6Rrhfn1hkRfbaj8HGcTcSq?redacted_email&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffa52649758,0x7ffa52649768,0x7ffa526497782⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 --field-trial-handle=1812,i,15846680854059386102,3194601803710158389,131072 /prefetch:22⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,15846680854059386102,3194601803710158389,131072 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1812,i,15846680854059386102,3194601803710158389,131072 /prefetch:82⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1812,i,15846680854059386102,3194601803710158389,131072 /prefetch:12⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3200 --field-trial-handle=1812,i,15846680854059386102,3194601803710158389,131072 /prefetch:12⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4852 --field-trial-handle=1812,i,15846680854059386102,3194601803710158389,131072 /prefetch:12⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3744 --field-trial-handle=1812,i,15846680854059386102,3194601803710158389,131072 /prefetch:82⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5040 --field-trial-handle=1812,i,15846680854059386102,3194601803710158389,131072 /prefetch:82⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1812,i,15846680854059386102,3194601803710158389,131072 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2812
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456B
MD500c94415b842c0a4ea07902ec41b194b
SHA1154c6bb5b3a96c4e1b04714674b08df36ea4c98c
SHA2568c762fe753342c0c5a55a02b7e2871b7632620dc69dd8be5edea4ed6d420199d
SHA512b022673a38769f2ba235e21a1f7b967358e68eb7cbeb250a41fdc98171f50c76b6c9bdba4a83fa697687d9f6c4386265233bfc0f4d478fb3edcb639a4f97c0ee
-
Filesize
1KB
MD53db9d5c30f37a921c7d6b0755a0abcc9
SHA1421c2ce55ca737df5791c8beee9799840e1f112f
SHA2569ec1052d09dc68fc099d542c69ebcca20f0913e80d9f2eeb8d2cef89f8f3c4a4
SHA5127a1f041b6e8170890474f961c5e848986e181648a613ad2941ad5c25dd9ed93bb079af8decbafee5ce74aa0c3e5f65a32194fadc39900e35e3e2c6a14e1292ea
-
Filesize
6KB
MD539c78f554cd7b061c5ab1e65acdd99d3
SHA15b9306b58392c71b96822182a46728d51c4cd956
SHA25642d0c0d0bdc291b74e6ce6071be6e8d4f638f7e882a64f07ccae165a0a0f3b00
SHA512e0814656cff8cdacdc7fd09eeeec4bb009d14da2f1e223686d9b4496a15292c5635367dbbb9df3744ccbda54d6048f8c79f3de9c1da727b7e631a0717a408e32
-
Filesize
15KB
MD5c91cbea3bdba4bc7ffc64d5e42e3fa1d
SHA1521f07e768bf74a5f2ecef411d2c18493b03a9f6
SHA25613bc6eb5d954423afe4fb6ed4a2bf55e741f441556a3a42dd293f80f218c73ea
SHA512f5da522c23ac1acd820415d99a759b8ccdaa0ebd4e4d45b0c59ebc751b1b8b3e38fc221a4a01ee2809dc261dda6f3f4c57777b9a46862bfaef865f4a7d5f5f50
-
Filesize
144KB
MD5a2014af0b1059142616f62deb94ffa8d
SHA1742e57697239194bba2e3bb941fbbb90ccdef590
SHA25634ab3cbed7568f6180ea66afda1cd83e6b795a0e40726b32bdf2b6a8e4c54d12
SHA512b176a1c4306cc59d99dccafc55d4aadf9ed4938eac3752e921112053148a01e95761886540f3b8f0fc160629035f16576947a1b089af830ac860476276d6443e
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd